Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 1 Nov 2001 01:26:21 +1000
From:      David Trzcinski <xlr82xs@xlr82xs.shacknet.nu>
To:        freebsd-security@FreeBSD.ORG
Subject:   Re: can I use keep-state for icmp rules?
Message-ID:  <20011031152625.8040B137CB@xlr82xs.shacknet.nu>
In-Reply-To: <004001c1621c$e85bc820$0b6cffc8@infolink.com.br>
References:  <009c01c16017$dca045d0$0603a8c0@MIKELT> <000901c1620f$51428530$2801010a@MIKELT> <004001c1621c$e85bc820$0b6cffc8@infolink.com.br>

next in thread | previous in thread | raw e-mail | index | archive | help
heh

this kinda makes me wonder why people use keep-state :P

ipfw add allow icmp from any to any out via <interface> icmptype 8
ipfw add allow icmp from any to <me> in via <interface> icmptype 0

will work fine for pings, just change the icmptypes to suit what you want to 
do...

you dont even need the outbound one if you allow all outbound traffic...

i dont use keep-state for my tcp either, with

ipfw add allow tcp from any to any out via <interface>
ipfw add allow log tcp from any to any 80 in via <interface> setup
ipfw add allow tcp from any to any in via <interface> connected
ipfw add deny log tcp from any to any in via <interface>

which, as far as i know should stop the problems mentioned with useing 
keepstate..

if i'm wrong, please tell me :)


On Thu, 1 Nov 2001 01:01, Antonio Carlos Pina wrote:
> Try again:
>
> ipfw check-state
> ipfw add allow icmp from {thishost} to any out via {oif} keep-state
> ipfw add deny icmp from any to any
>
> If your firewall is open by default, all packets will go thru. You have to
> got it closed by default or explicit deny the packets you don't want, as
> seen above.
>
> You should only ping the host back while the dynamic rule exists.
>
> Regards,
> Antonio Carlos Pina
> Diretor de Tecnologia (CTO)
> INFOLINK Internet
> http://www.infolink.com.br
>
> ----- Original Message -----
> From: "Michael Scheidell" <scheidell@fdma.com>
> To: <freebsd-security@freebsd.org>
> Sent: Wednesday, October 31, 2001 11:24 AM
> Subject: Re: can I use keep-state for icmp rules?
>
> > ----- Original Message -----
> > From: "Crist J. Clark" <cristjc@earthlink.net>
> > To: "Michael Scheidell" <scheidell@fdma.com>
> > Cc: <freebsd-security@freebsd.org>
> > Sent: Tuesday, October 30, 2001 7:42 PM
> > Subject: Re: can I use keep-state for icmp rules?
> >
> > > On Tue, Oct 30, 2001 at 07:39:09AM -0500, Michael Scheidell wrote:
> > > > You mean if I send email to your system, you can immediatly connect
> > > > to
> >
> > my
> >
> > > > internal tcp ports that might not normally have external access
> >
> > available?
> >
> > > No. If you send out a TCP packet to my system that matches your
> > > 'keep-state' rule,
> > >
> > >                    TCP
> > >   src_ip.src_port ----> dst_ip.dst_port
> > >
> > > I can send _any_ TCP packet back,
> > >
> > >                    TCP
> > >   src_ip.src_port <---- dst_ip.dst_port
> > >
> > > And it will pass provided the source and destination IP and ports all
> > > line up. ipfw(8) does not consider the TCP flags, sequence number,
> >
> > So, is ipfilter MORE statefull? ie, will it check more carefully?
> > One reason I asked, while testing the ipf icmp rules.
> >
> > Step 1: ipfw add allow icmp from {thishost} to any out via {oif}
>
> keep-state
>
> > Step 2: ping remote host
> >     (works)
> > Step 3: log on to remote host and ping {thishost} back.  I was able to
>
> ping
>
> > it.
> >   Sorta scared me. (no additional ipfw rules)
> >
> >
> >
> >
> > To Unsubscribe: send mail to majordomo@FreeBSD.org
> > with "unsubscribe freebsd-security" in the body of the message
>
> To Unsubscribe: send mail to majordomo@FreeBSD.org
> with "unsubscribe freebsd-security" in the body of the message

-- 
                  Weird enough for government work.

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20011031152625.8040B137CB>